P1kachu / my_memcheck
LSE recruitment 2016 - Memory Checker
☆11Updated 8 years ago
Alternatives and similar repositories for my_memcheck:
Users that are interested in my_memcheck are comparing it to the libraries listed below
- Cross-Qt compatibility module for IDAPython.☆13Updated 5 years ago
- IDApro idc and idapython script collection☆28Updated last year
- ROP Payload Compiler☆11Updated 7 years ago
- ☆15Updated 9 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- OS X rootkit loader version #2☆12Updated 10 years ago
- Immunity Debugger Taint Tracer☆20Updated 11 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Updated 6 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- ☆9Updated 9 years ago
- IDA recompiler☆31Updated 10 years ago
- Lightweight Symbolic Execution Engine☆23Updated 9 years ago
- collection of scripts and stuff☆12Updated 8 years ago
- CVE-2013-2597 exploit☆12Updated 10 years ago
- Fetch and set configuration values from IDAPython scripts☆21Updated 4 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Updated 10 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆18Updated 9 years ago
- Toy binaries to play with -fsanitize=safe-stack/cfi☆9Updated 9 years ago
- ☆13Updated 8 years ago
- ☆25Updated 6 years ago
- ☆12Updated 7 years ago
- ☆14Updated 7 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆17Updated 7 years ago
- libs2e.so☆20Updated 4 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Updated 12 years ago
- S2E plugins library☆17Updated 5 years ago
- ☆16Updated 7 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- Recover control flow graph from obfuscated codes☆38Updated 9 years ago